Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Loan
Insurance
Ask a Question
The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
Home
Threat Modeling
The following can be classified as which kind of threat as per...
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
a) Spoofing
b) Tampering
c) Repudiation
d) Information Disclosure
threat-modeling
spoofing
security
ssa
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 18, 2021
by
sharadyadav1986
b) Tampering
Related questions
0
votes
Q: Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing
threat-modeling
ssa
0
votes
Q: Which of the following issues can be addressed using an efficient logging system?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
information-logging
security
threat-modeling
0
votes
Q: While performing threat modeling for an application design, which of the following is the formula for calculating Risk Score?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application-design
risk-score
ssa
0
votes
Q: The theft of intellectual property is a threat to information security.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-information
information-security
threat-modeling
ssa
0
votes
Q: State True or False: It is not a responsibility of a supplier to deliver secure software.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
secure-software
0
votes
Q: State True or False: Maintenance (Operational) Security is not required if software is developed securely.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
secure-software
security
0
votes
Q: Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
Q: _________ is a medium that allows data to flow between domains of trust.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
trust-domains
data-flow
information-security
threat-modeling
security
0
votes
Q: Why is it not a good idea to include readymade code from Google search into the customer application deliverables even though it may save a lot of time and cost for the project?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
google-search
threat-modeling
ssa
0
votes
Q: The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#validations
threat-modeling
ssa
ascii-range
0
votes
Q: The following is a part of a threat model, except _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-model
threat-modeling
information-security
0
votes
Q: Which of the following threat can be handled using access control?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-handling
threat-modeling
access-control
0
votes
Q: Identity theft is an example of __________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-example
threat-modeling
ssa
0
votes
Q: Microsoft’s Threat Modeling tool uses __________ threat classification scheme.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-tools
threat-classificaiton
0
votes
Q: Identify Correct statement:
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
sql-injection-attack
...